securityaffairs.com Open in urlscan Pro
2606:4700:3031::ac43:8cd3  Public Scan

Submitted URL: http://securityaffairs.com/
Effective URL: https://securityaffairs.com/
Submission: On July 28 via manual from SG — Scanned from SG

Form analysis 1 forms found in the DOM

Name: searchformGET https://securityaffairs.com/

<form role="search" method="get" name="searchform" id="searchform" action="https://securityaffairs.com/">
  <div>
    <input type="text" value="" name="s" id="s" autocomplete="off" title="Search..." class="blur">
    <button type="submit">
      <i class="fa fa-search"></i>
    </button>
  </div>
  <div id="autocomplete"></div>
</form>

Text Content

 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * POLICIES
 * Contact me


MUST READ

Headlines
 * Monitor Insider Threats but Build Trust First
 * Zimbra fixed actively exploited zero-day CVE-2023-38750 in ZCS
 * DepositFiles exposed config file, jeopardizing user security
 * Group-IB CEO Ilya Sachkov sentenced to 14 years in a strict prison colony
 * Two flaws in Linux Ubuntu affect 40% of Ubuntu users
 * Two ambulance services in UK lost access to patient records after a cyber
   attack on software provider



 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * POLICIES
 * Contact me



MONITOR INSIDER THREATS BUT BUILD TRUST FIRST

The issue of how to prevent insider threats without infringing on employee
privacy is one that has been a hot topic of debate in recent years. Because
insider threats are uniquely challenging to detect and identify, different
methods are needed than...

July 28, 2023  By Pierluigi Paganini   Posted In  Breaking News  Security 



ZIMBRA FIXED ACTIVELY EXPLOITED ZERO-DAY CVE-2023-38750 IN ZCS

Zimbra addressed a zero-day vulnerability exploited in attacks aimed at Zimbra
Collaboration Suite (ZCS) email servers. Two weeks ago Zimbra urged customers to
manually install updates to fix a zero-day vulnerability, now tracked as
CVE-2023-38750,...

July 27, 2023  By Pierluigi Paganini   Posted In  Breaking News  Security 



DEPOSITFILES EXPOSED CONFIG FILE, JEOPARDIZING USER SECURITY

DepositFiles, a popular web hosting service, left its environment configuration
file accessible, revealing a trove of highly sensitive credentials. The recent
tsunami of Cl0p-driven ransomware attacks via the MOVEit Transfer exploit is a
painful...

July 27, 2023  By Pierluigi Paganini   Posted In  Breaking News  Data Breach 
Hacking 



GROUP-IB CEO ILYA SACHKOV SENTENCED TO 14 YEARS IN A STRICT PRISON COLONY

Ilya Sachkov, CEO and co-founder of Group-IB was sentenced to 14 years in a high
security prison colony according to the Moscow court announcement. As per the
announcement from the Moscow court, Ilya Sachkov, the CEO and co-founder of
Group-IB, has been...

July 27, 2023  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 
Intelligence 



TWO FLAWS IN LINUX UBUNTU AFFECT 40% OF UBUNTU USERS

Wiz researchers discovered two Linux vulnerabilities in the Ubuntu kernel that
can allow an unprivileged local user to gain elevated privileges. Wiz Research
discovered two privilege escalation vulnerabilities, tracked as CVE-2023-2640
and CVE-2023-32629,...

July 27, 2023  By Pierluigi Paganini   Posted In  Breaking News  Hacking 



TWO AMBULANCE SERVICES IN UK LOST ACCESS TO PATIENT RECORDS AFTER A CYBER ATTACK
ON SOFTWARE PROVIDER

Swedish software firm Ortivus suffered a cyberattack that has resulted in at
least two British ambulance services losing access to electronic patient
records. Two British ambulance services were not able to access electronic
patient records after...

July 26, 2023  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 
Hacking 



FRAUDGPT, A NEW MALICIOUS GENERATIVE AI TOOL APPEARS IN THE THREAT LANDSCAPE

FraudGPT is another cybercrime generative artificial intelligence (AI) tool that
is advertised in the hacking underground. Generative AI models are becoming
attractive for crooks, Netenrich researchers recently spotted a new platform
dubbed FraudGPT...

July 26, 2023  By Pierluigi Paganini   Posted In  Breaking News  Cyber Crime 
Hacking 



CISA ADDS IVANTI EPMM FLAW TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

US CISA added actively exploited Ivanti 's Endpoint Manager Mobile (EPMM)
vulnerability to its Known Exploited Vulnerabilities catalog. US Cybersecurity
and Infrastructure Security Agency (CISA) added actively exploited Ivanti 's
Endpoint Manager...

July 26, 2023  By Pierluigi Paganini   Posted In  Breaking News  Hacking 
Security 



OVER 500K MIKROTIK ROUTEROS SYSTEMS POTENTIALLY EXPOSED TO HACKING DUE TO
CRITICAL FLAW

Experts warn of a severe privilege escalation, tracked as CVE-2023-30799, in
MikroTik RouterOS that can be exploited to hack vulnerable devices. VulnCheck
researchers warn of a critical vulnerability, tracked as CVE-2023-30799 (CVSS
score:...

July 26, 2023  By Pierluigi Paganini   Posted In  Breaking News  Hacking 



ATLASSIAN ADDRESSED 3 FLAWS IN CONFLUENCE AND BAMBOO PRODUCTS

Atlassian addressed three vulnerabilities in its Confluence Server, Data Center,
and Bamboo Data Center products that can lead to remote code execution.
Atlassian has addressed three critical and high severity vulnerabilities
impacting...

July 25, 2023  By Pierluigi Paganini   Posted In  Breaking News  Security 


12345Next ›Last »
Page 1 of 1475
 * 


 * DIGGING THE DEEP WEB: EXPLORING THE DARK SIDE OF THE WEB

 * 


 * CENTER FOR CYBER SECURITY AND INTERNATIONAL RELATIONS STUDIES


 * SUBSCRIBE SECURITY AFFAIRS NEWSLETTER


 * SECURITY AFFAIRS AWARDED AS BEST EUROPEAN TECH BLOG AT EUROPEAN CYBERSECURITY
   BLOGGER AWARDS


Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
 * Home
 * Cyber Crime
 * Cyber warfare
 * APT
 * Data Breach
 * Deep Web
 * Digital ID
 * Hacking
 * Hacktivism
 * Intelligence
 * Internet of Things
 * Laws and regulations
 * Malware
 * Mobile
 * Reports
 * Security
 * Social Networks
 * Terrorism
 * ICS-SCADA
 * POLICIES
 * Contact me

We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept All”, you
consent to the use of ALL the cookies. However, you may visit "Cookie Settings"
to provide a controlled consent.
Cookie SettingsAccept All
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT


Go to mobile version
Ad